• No results found

traffic matrices

Anomaly Detection and Localization by Diffusion Wavelet-based Analysis on Traffic Matrix

Anomaly Detection and Localization by Diffusion Wavelet-based Analysis on Traffic Matrix

... In this paper, we showed that DW-based techniques can perform an effective multi- resolution analysis for traffic matrices. Based on the study of analysis results, we presented a novel method on anomaly ...

14

Title: Theoretic Approach for Peer-to-Peer Traffic Matrix Estimation

Title: Theoretic Approach for Peer-to-Peer Traffic Matrix Estimation

... Traffic Matrices: esteem activity lattices in view of prepared (to be utilized) yet not sufficiently great data 10 ...general traffic, whose things capture as certain are invalid for P2P ...P2P ...

6

Virtualization Of Data Center Towards Load Balancing And Multi-Tenancy

Virtualization Of Data Center Towards Load Balancing And Multi-Tenancy

... Another related work is [14]. The network model used in [14] classifies links into over-loaded ones and under-loaded ones, according to that the link load is greater than half the capacity or not. This model is clear and ...

7

Temporal Anomaly Detection: Calibrating the Surprise

Temporal Anomaly Detection: Calibrating the Surprise

... of traffic matrices seems the most similar to our ...The traffic ma- trix of each time unit contains the amount of data transferred from source IP address to destination IP ...the traffic ...

8

Localizing Node Failures in Network Topology and Locations of Monitors

Localizing Node Failures in Network Topology and Locations of Monitors

... point-to-point traffic matrices such that two packets captured at different time could be the same packet appearing at different locations, such as the two packets sent by node 1 and node 2 ...Each ...

5

Failure Detection Approach for Localizing Node Failures in wireless Networks

Failure Detection Approach for Localizing Node Failures in wireless Networks

... point-to-point traffic matrices by using the raw captured packets and constructs end-to-end traffic ...point-to-point matrices with the captured packets at the certain period ...point-to-point ...

6

Protection of an intrusion detection engine with watermarking in ad hoc networks

Protection of an intrusion detection engine with watermarking in ad hoc networks

... The presented evaluation proves that we can achieve a differentiation between normal and abnormal behaviors concerning packet-dropping attacks. In order to per- form clustering with eSOM U-Matrices we followed the ...

27

Labelling matrices and index matrices of a graph structure

Labelling matrices and index matrices of a graph structure

... labelling matrices and index matrices of graph structures and prove that the collection of all admissible index matrices and the collection of all labelling matrices for 0 form free F ...

19

Transpose of Nörlund matrices on the domain of summability matrices

Transpose of Nörlund matrices on the domain of summability matrices

... the columns and the rows of the summability matrix E. In particular, we apply our results to domains of some summability matrices such as Fibonacci, Karamata, Euler, and Taylor matrices. Our result is an ...

5

Stable matrices, the Cayley transform, and convergent matrices

Stable matrices, the Cayley transform, and convergent matrices

... STABLE MATRICES, THE CAYLEY TRANSFORM, AND CONVERGENT MATRICES TYLER HAYNES Mathematics Department Saginaw Valley State University University Center, Michigan 48710 Received January 17, [r] ...

5

Matrices

Matrices

... Remark If AB is defined, then BA need not be defined. In the above example, AB is defined but BA is not defined because B has 3 column while A has only 2 (and not 3) rows. If A, B are, respectively m × n, k × l ...

47

orecchia.pdf

orecchia.pdf

... Highlights of Previous Work Direct solvers for general matrices Direct solvers for general matrices Iterative methods for PSD matrices Iterative methods for PSD matrices Conjugat[r] ...

149

A model for Traffic noise prediction in heterogeneous traffic conditions

A model for Traffic noise prediction in heterogeneous traffic conditions

... a traffic noise prediction methodology for heterogeneous traffic ...conditions. Traffic noise characteristics in cities of developing country like India are slightly varied by virtue of the fact that ...

5

Low Complexity Pipelined FFT Design for High Throughput and Low Density Applications

Low Complexity Pipelined FFT Design for High Throughput and Low Density Applications

... Rotator allocation simply consists of reorganizing the matrices of indexes and, therefore, the matrices of rotations, in such a way that the matrices of rotations have less rotators if p[r] ...

7

Hamacher Sum and Hamacher Product of Fuzzy Matrices

Hamacher Sum and Hamacher Product of Fuzzy Matrices

... The paper is organized in three sections. In section 2,we give the basic definitions and operations on fuzzy matrices which will be used in this paper. In section 3, we introduce the hamacher operations on fuzzy ...

8

Inequalities For Singular Values And Traces Of Quaternion Hermitian Matrices

Inequalities For Singular Values And Traces Of Quaternion Hermitian Matrices

... Keywords: Hermitian Matrices, Quaternian Matrices, Singular value, Trace of Matrix, Triple Complex Matrices... Page 121 www.ijiras.com | Email: contact@ijiras.com The proof is complete[r] ...

5

Selection Criteria of Measurement Matrix for Compressive Sensing Based Medical Image Reconstruction

Selection Criteria of Measurement Matrix for Compressive Sensing Based Medical Image Reconstruction

... The reconstructed PSNR(peak signal to noise ratio) values, SSIM(structural similarity index measurement) values, CR(compression ratio) values and reconstruction time were used to compare the simulation results. Figures ...

8

Statistically strongly regular matrices and some core theorems

Statistically strongly regular matrices and some core theorems

... For any two sequence spaces X and Y , we denote by (X,Y ) a class of matrices A such that Ax ∈ Y for x ∈ X , provided that the series on the right of (1.8) converges for each n . If, in addition, lim Ax = lim x , ...

9

Uncertainty Weight Generation Approach Based on Uncertainty Comparison Matrices

Uncertainty Weight Generation Approach Based on Uncertainty Comparison Matrices

... comparison matrices and fuzzy matrices, which are transformed into uncertainty comparison matrices using linear uncertainty distribution and zigzag uncertainty distribution respec- ...

9

3A Operations with matrices 3B Multiplying matrices 3C Powers of a matrix 3D Multiplicative inverse and solving matrix equations 3E The transpose of a matrix 3F Applications of matrices 3G Dominance matrices

3A Operations with matrices 3B Multiplying matrices 3C Powers of a matrix 3D Multiplicative inverse and solving matrix equations 3E The transpose of a matrix 3F Applications of matrices 3G Dominance matrices

... A matrix equation AX = B is similar to the equation 3x = 7. To solve this we would divide both sides of the equation by 3 (or multiply by ). To solve the matrix equation we multiply both sides by A − 1 . Since the order ...

42

Show all 7557 documents...

Related subjects